Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 561 The masterpiece of a lunatic

Han Chu took people there to restore the virus, and then simulated it on a test machine, but the time of the virus attack was adjusted. After five minutes, the hard disk kept turning, all the data was corrupted, and the hard disk partition information was also lost.

A technician around Han Chu explained to Fan Wubing, "After this virus attack, the hard disk can be rezoned. In addition, when the virus attacks, it may also destroy the voltage of certain types of motherboards. Rewrite the bi in read-only memory. The damaged motherboard can only be sent back to the original factory for repair and burned into the bi. This is also the only virus we have discovered so far that can destroy the hardware, and it is of great significance!"

Fan Wubing nodded and asked, "This is indeed a major discovery. Have you found a way to deal with it?"

The staff immediately nodded and replied, "In the version of this virus, the information identifying the version number is in plain text, so you can search for strings in the executable file to identify whether you are infected with a virus. The feature string search is iv or if you want to search for a more complete feature string, you can try to remember not to directly search for i feature strings, because this also exists in many normal programs and is prone to misjudgments."

Another staff member prompted, "The specific search method is to first enable the Explorer, select the menu function tool to find a file or folder, enter the feature string to be found in the pop-up window input, and then click the search key to start the search work. If a large number of executable files that match the search characteristics are displayed during the search process, it means that your computer has been infected with this virus."

Han Chuze explained, "In fact, there is a fatal disadvantage in the method used, that is, if the user has just been infected with this virus, then such a large-scale search process is actually expanding the infection of the virus. The best way is to use regular antivirus software or targeted special killing tools to kill it."

Fan Wubing nodded and asked, "How did you find this thing?"

Logically, why was the i virus discovered by Han Chu and others on April 26 next year? It seems that his rebirth has indeed caused a huge change in many things. At least if the i virus is discovered at this time, it will avoid the large number of computer paralysis caused by next year.

"According to our analysis, its carrier is a tool called the iQ Chinese T module, and uses popular pirated CD games such as Tomb Raider or Ind959 as a medium, and it is reproduced with each other on the Internet websites to make it spread quickly. At present, the main ways of dissemination are mainly through intercom and email, and its existence has also been found on some CDs." Han Chu introduced, "But it is fortunate that it was launched on April 26 next year, and there is no harm yet."

"Has the new virus been named?" Fan Wubing asked casually.

"We all use feature codes to name it i virus." A staff member replied.

Fan Wubing touched his nose unnaturally, thinking that the naming method was exactly the same as before.

The i virus only infects the ind959 operating system. Judging from the current analysis, it does not seem to have any impact on the D operation system. This may be because it uses the virtual device driver technology under the ind. Therefore, for users who only use D, this virus does not seem to have any impact, but if it is an ind959 user, you should pay special attention. It is precisely because i uniquely uses vxd technology that this virus spreads in the ind environment, and is actually very time-consuming and concealed. It is difficult to discover the spread of this virus in the system using general anti-virus software.

When the virus occurs, on the one hand, it completely destroys the data of the computer system hard disk, and on the other hand, it rewrites the bi on some computer motherboards. After the bi is rewritten, the system cannot start, so the computer can be sent back to the manufacturer for repair and replaces the bi chip.

Since the i virus's destruction effect on data and hardware is irreversible, once the i virus breaks out, users can only watch the computer worth tens of thousands of yuan and the important data accumulated over the years be destroyed. It can now be determined that the i virus is the first virus that can destroy computer system hardware, and it is also the most lethal malignant virus.

From a technical point of view, the i virus achieves a perfect combination with the operating system. The virus uses the most core VXD technology of ind959 and is considered to be firmly connected to the underlying layer of the operating system. Therefore, the i virus will neither spread to the d operating system nor spread to the indnt operating system.

Han Chu explained to Fan Wubing, "The reason we attach great importance to this is not only because of its destructiveness, but because the technical characteristics of the i virus pose a huge challenge to us using traditional anti-virus technology to prevent and control computer viruses. This is because the traditional anti-virus tools we use are basically pure D or simulated D applications that work under ind95. They cannot go deep into the bottom layer of the ind959 operating system to completely remove the i virus. On the other hand, because they can be closely linked to the bottom layer of the operating system, the i virus spreads faster and hidden. The best way to prevent and control viruses like i that can be closely linked to the operating system is to use anti-virus software that can be closely linked to various operating systems."

The i virus does not usually do any destructive actions, nor does it display any screen, it only occupies part of the memory. However, after some programs are infected, they will operate abnormally and may even cause a crash. However, the i virus will be checked every time it is executed. If it meets the requirements, it will destroy all the data of the user's computer's hard disk, and even the data of the hard disk data area and the boot area are gone.

When the user restarts the computer, the hard disk boot fails. Please click Enter after the system disk. Even if there has been a backup boot area information, the information on your disk has been completely destroyed. It is meaningless to boot it.

When mentioning this i-virus that caused the paralysis of 60 million computers around the world, Fan Wubing naturally remembered the author of the creation, Chen Yinghao, a Taiwanese man.

Chen Yinghao has been obsessed with computers since his first year of college. He has to download the most popular software and games every day, so he often encounters computer viruses. In order to solve the trouble of repeated computer poisoning, he reads newspapers and buys many antivirus software that are so popular that he often makes a lot of advertisements. As a result, he often has nothing to do, so he feels he has been deceived.

The iVirus was designed entirely by him, with the purpose of coming up with a fool who boasted about "100% antivirus software" in advertising.

Chen Yinghao has a history of epilepsy. Although he is easy-going, he will become very stubborn when talking about computers. According to his college classmates, he usually gets along very happily with Chen Yinghao, but if anyone mentions computers, he will show a very aggressive look. He especially doesn't like others claiming that computers are very good. In the past, students of the computer department of Datong Institute of Technology often like to compare programs to see who can write programs with the shortest number of travel and the most complex meaning. However, this kind of competition is boring in Chen Yinghao's eyes and he doesn't bother discussing with them. In order to show his own strength, he deliberately wrote a program with only three lines of content but is very difficult, which ended up making computer majors stare at them.

When Chen Yinghao was serving in the army, he boasted to the military that he could design a program that would cause military computers to be paralyzed. The Taiwan Military Intelligence Bureau was very interested in this and was ready to take him under his command and act as an expert in electronic warfare. However, after they investigated Chen Yinghao's family history, they found that he was unstable and had a family mental illness. Therefore, the Taiwan Military Intelligence Bureau not only did not incorporate him, but also allowed him to retire immediately.

"Have we developed the corresponding antivirus software? and post-disaster recovery programs?" Fan Wubing shook his hair and asked Han Chu.

"Post-disaster recovery is probably not easy, but software to find or prevent is already available. Considering the harm of the virus, we plan to officially release the special killing tool for this virus and distribute it to users for free." Han Chu said to Fan Wubing.

For a long time, the anti-virus department of the FN club has often released some special killing tools to the public, which are used to solve some virus problems that often bother everyone, and the effect is also very good. Therefore, Han Chu believes that this time, the virus with such a great impact and destructive power is naturally needed to predict it to users in advance.

However, Fan Wubing didn't think so. He shook his head and said, "No, this matter needs long-term consideration. You cannot publish this news to the outside for the time being. I have important arrangements to consider."

The rampant i virus is mainly abroad. One reason is that the popularity of the Internet abroad is much higher than that of the domestic one. Another reason is that the Internet is open to the foreign country is relatively high, and users are more likely to be infected with the virus through the Internet. In China, it is generally transmitted through floppy disks or CDs. As for some, there are also some that are transmitted through the Internet, but the overall number is not large.

Fan Wubing remembers it very clearly that there are very few computers affected in China, but many overseas are affected. Since the impact of this virus has a huge impact on overseas, there is no reason for me to reveal this fact now and let foreigners enjoy their own achievements?

Of course, Fan Wubing also asked Han Qiao to integrate the special killing tool for i virus into the new version of Pili Beibei anti-virus software to upgrade it to its users for free.

"We only need to be responsible to our users, and we cannot take the meaning of this virus too seriously. We will treat it as a general virus." Fan Wubing said to Han Chu, "Otherwise, once everyone notices this problem, we will blame us for making a fuss and deliberately create a tense atmosphere."

"Isn't it a bit too unkind to do this?" Han Chu disagreed with Fan Wubing's opinion.

Fan Wubing said to Han Chu very seriously, "From a business perspective, it is understandable that we do this. At least we are working hard to avoid domestic users being affected. This job is free. For overseas markets, they don't buy our antivirus software, so what if they don't care about their life or death?"

If the i-virus attacks as scheduled in April next year, if many anti-virus companies have no solutions for a while, and their situation is as stable as a rock, the fn club's anti-virus software will suddenly increase to a level that is well-known to everyone. It will have a huge effect on further expanding the reputation of the company's anti-virus business unit and expanding the overseas market. This business opportunity cannot help but make Fan Wubing feel moved.

Sometimes, if you should be ill-hearted, you should be ill-hearted, and if you should be irritated, you should be irritated. Otherwise, you will never achieve great things!

In short, this opportunity is rare in a century. Fan Wubing did not think of this before. If Han Chu's anti-virus division had not discovered the whereabouts of i and analyzed the harm when it occurred, and Han Chu would have performed this virus that could destroy hardware as a result, he would not have thought of using this matter to further expand the popularity of his anti-virus software.

Everything depends on an opportunity. Since the opportunity is in front of you, you need to seize it, operate it well, and achieve your own goals, so that the company's anti-virus software can go to the world market in one fell swoop.

This opportunity was something that Fan Wubing could not let go, so he directly denied Han Chu's opinion on the public's characteristics and removal tools, and decided to conceal the matter as his trump card.

"Although it is a bit unkind to do this, we must do our best to do a good job in domestic prevention and control. I will also communicate with the Ministry of Security to promote our antivirus software in domestic office computers to prevent and control the spread of i viruses." Fan Wubing explained to Han Chu, "The Ministry of Security has a good relationship with me, and this can be done well. Moreover, for national security, it is also beneficial to do this. At least we can start to consider in advance how to deal with it and how to prevent it when a similar situation occurs?"
Chapter completed!
Prev Index    Favorite Next